You are on page 1of 2

It�s okay to be (a little) paranoid.

Being aware of what�s going on, online and offline, can help you keep safe from
compromise.
Simple rules to live by online:
If it sounds/looks too good to be true, it�s probably not true.
If it looks fishy, better stay away.
If someone asks for your confidential data, don�t give it to them.

In small doses, paranoia is a good thing.

Cyber Security Tip #15: Ulterior motives

Linkedin recruiter or attacker in disguise?

Cyber criminals often create fake Linkedin profiles to gain access to details about
you that they can use later. They collect data about your studies, names of
employers and connections, etc.

Check out their profiles before accepting their connection request. Warning signs
to look for:

too little, generic info


picture that looks like stock photography
Very few connections.

Use Two-Factor Authentication


It�s important to have a strong password, but it�s even more imperative to have
two-factor, or multi-factor, authentication. This method provides two layers of
security measures so if a hacker can accurately guess your password, there is still
an additional security measure in place to ensure that your account is not
breached.

3. Look Out for Phishing Scams


With over 3 billion fake emails sent daily, phishing attacks are some of the
greatest cybersecurity threats as they are very easy to fall for. In a phishing
attack, a hacker will pose as someone that the recipient may be familiar with to
trick them into opening a malicious link, divulging important credentials, or
opening software that infects the recipient�s system with a virus. The best way to
be on the lookout for phishing scams is by avoiding emails from unfamiliar senders,
look for grammatical errors or any inconsistencies in the email that looks
suspicious, and hover over any link you receive to verify what the destination is.

RELATED: 15 Alarming Statistics About Law Firm Data Security


cyber security tips
4. Keep Track of Your Digital Footprint
When you monitor your accounts, you can ensure you catch suspicious activity. Can
you recall everywhere you have online accounts and what information is stored on
them, like credit card numbers for easier payments? It�s important to keep track of
your digital footprint, including social media, and to delete accounts you�re not
using, while ensuring you set strong passwords (that you change regularly).

5. Keep Up With Updates


Software patches can be issued when security flaws are discovered. If you find
these software update notifications to be annoying, you�re not alone. But you can
consider them the lesser of two evils when weighing up rebooting your device versus
putting yourself at risk for malware and other types of computer infection.
6. Connect Securely
Cyber security tips about this have been dished out by nearly every tech expert
under the sun, but many still don�t follow this advice. You might be tempted to
connect your device to an unsecured connection, but when you weigh the
consequences, it�s not worth it. Only connect to private networks when possible,
especially when handling sensitive information.

cyber security tips


7. Secure Your Mobile Device
Security doesn�t end at your desktop. It�s important to get

Cyber Security Tip #16: How to automate software updates for free

You might also like